[tor-bugs] #5460 [Tor Client]: Write proposal(s) to evaluate circuit crypto authentication

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Thu May 17 23:17:40 UTC 2012


#5460: Write proposal(s) to evaluate circuit crypto authentication
------------------------+---------------------------------------------------
 Reporter:  mikeperry   |          Owner:  nickm             
     Type:  defect      |         Status:  assigned          
 Priority:  major       |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor Client  |        Version:                    
 Keywords:              |         Parent:  #5456             
   Points:              |   Actualpoints:                    
------------------------+---------------------------------------------------

Comment(by arma):

 Replying to [comment:1 rransom]:
 > BEAR/LION/LIONESS are not ‘self-authenticating crypto’.  They are large-
 block block ciphers which ensure that any change to a block's data on one
 side of an honest relay completely scrambles the block's data on the other
 side.  They would need to be accompanied by an end-to-end MAC.

 Even if accompanied by an end-to-end mac, isn't that insufficient? If I
 can mangle a cell, and detect mangling, and it still gets to the other
 end, that sounds like a tagging attack to me. It's not as fine-grained a
 tagging attack sure, but if the goal is "cause circuit failure at the 2nd
 hop, not the third" then it's not going to do it, right?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5460#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list